CVE-2025-46805
Linux Debian vulnerability analysis and mitigation

Overview

Screen version 5.0.0 and older version 4 releases contain a time-of-check/time-of-use (TOCTOU) race condition vulnerability when installed setuid-root. The vulnerability was discovered in May 2025 and affects the signal handling functionality in Screen, specifically in socket.c where signals are sent to user-supplied PIDs in setuid-root context (MITRE CVE, OpenWall).

Technical details

The vulnerability exists in the CheckPid() function which drops privileges to the real user ID and tests whether the kernel allows sending a signal to the target PID using these credentials. However, the actual signal is sent later via Kill(), potentially using full root privileges. This creates a race condition where the PID that was previously checked could have been replaced by a different, privileged process. The issue resulted from an incomplete fix for CVE-2023-24626. The vulnerability has been assigned a CVSS v4.0 Base Score of 5.7 (Medium) according to SUSE's assessment (NVD Entry, SUSE Bugzilla).

Impact

The vulnerability allows sending SIGCONT and SIGHUP signals to privileged processes through a race condition. The primary impact is limited to local denial of service or minor integrity violations. It might also be possible to trick the privileged Screen daemon process into sending signals to itself, since a process is always allowed to send signals to itself (OpenWall).

Mitigation and workarounds

The issue can be addressed by sending the actual signal with real UID privileges, just like CheckPid() does. A patch has been provided that implements this fix. Additionally, it is recommended not to install Screen with setuid-root privileges at all, as this significantly reduces the attack surface (OpenWall).

Community reactions

The vulnerability was discovered during a comprehensive security audit by the SUSE Security Team. The disclosure process faced some challenges with upstream coordination, taking longer than initially expected. The security community has emphasized the importance of proper privilege handling in setuid-root binaries (OpenWall).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61729HIGH7.5
  • DockerDocker
  • go
NoYesDec 02, 2025
CVE-2025-66293HIGH7.1
  • OpenJDK JDKOpenJDK JDK
  • java-17-openjdk-headless-slowdebug
NoNoDec 03, 2025
CVE-2025-39665MEDIUM6.9
  • Linux DebianLinux Debian
  • nagvis
NoNoDec 03, 2025
CVE-2025-61727MEDIUM6.5
  • DockerDocker
  • golang-1.24
NoYesDec 03, 2025
CVE-2025-66453MEDIUM5.5
  • JavaJava
  • org.mozilla:rhino
NoYesDec 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management